Abstract
The following chapter presents findings on selected related work and places my work in the corresponding context. There are two categories of related work with relevance to my work that are considered in this chapter
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
V.C. Hu, D.F. Ferraiolo, D.R. Kuhn, Assessment of Access Control Systems. Interagency Report 7316, National Institute of Standards and Technology (2006)
D.F. Ferraiolo, D.R. Kuhn, Role-based access control, in Proceedings of the 15th NIST National Computer Security Conference (1992), pp. 554–563
A.S. Sodiya, A.S. Onashoga, Components-based access control architecture. Issues Inf. Sci. Inf. Technol. 6, 699–706 (2009)
OASIS Open. eXtensible Access Control Markup Language (XACML) V.2.0, Feb 2005
J. Clark, XSL Transformations (XSLT) (1999), http://www.w3.org/TR/xslt. Accessed 8 Mar 2012
E. Grummt, M. Schöffel, Verteilte Autorisation in RFID-Ereignissystemen, in D.A.CH Security: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, ed. by P. Horster (Berlin, 2008) pp. 337–345
ODRL Initiative: ODRL V2.0 - XML encoding (2010), http://odrl.net/2.0/WD-ODRL-XML.html. Accessed 8 Mar 2012
Global Standards 1: GS1 standards knowledge centre (2011), http://www.gs1.org/gsmp/kc/epcglobal/. Accessed 8 Mar 2012
International Organization for Standardization, ISO/IEC 18000: Information Technology— Radio Frequency Identification for Item Management, 2004–2010
International Telecommunication Union, ST61 Agreement (2011), http://www.itu.int/ITU-R/terrestrial/broadcast/plans/st61/index.html. Accessed 8 Mar 2012
A. Selian, 3G mobile licensing policy: from GSM to IMT-2000—a comparative analysis technical report, International Telecommunication Union (2001)
E.C. Jones, C.A. Chung, RFID in Logistics: A Practical Introduction (CRC Press, Boca Raton, 2007)
K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication, 2nd edn. (Wiley, New York, 2010)
M. Roberti, The history of RFID technology. RFID J. 1–3 (2008)
Heydt-Benjamin et al., Vulnerabilities in first-generation RFID-enabled credit cards, in Financial Cryptography and Data Security, volume 4886 of Lecture Notes in Computer Science, ed. by S. Dietrich, R. Dhamija (Springer, Berlin, 2007), pp. 2–14
Global standards 1: EPCglobal object name service 1.0.1 (2008), http://www.gs1.org/gsmp/kc/epcglobal/ons/ons_1_0_1-standard-20080529.pdf. Accessed 8 Mar 2012
Global Standards 1: EPCIS standard 1.0.1 (2007), http://www.gs1.org/gsmp/kc/epcglobal/epcis/epcis_1_0_1-standard-20070921.pdf. Accessed 8 Mar 2012
Global Standards 1: discovery services standard (in development) (2011), http://www.gs1.org/gsmp/kc/epcglobal/discovery. Accessed 8 Mar 2012
J. Müller, An in-memory discovery service to retrieve track & trace information in a unique identifier network with hierarchical packaging (to appear), Ph.D. thesis, Hasso Plattner Institute, 2012
Global Standards 1: EPCglobal certificate profile specification version 1.0 (2010), http://www.gs1.org/gsmp/kc/epcglobal/cert/cert_1_0-standard-20060308.pdf. Accessed 8 Mar 2012
Global standards 1: EPCglobal certificate profile specification version 2.0 (2010), http://www.gs1.org/gsmp/kc/epcglobal/cert/cert_2_0-standard-20100610.pdf. Accessed 8 Mar 2012
The Institute of Electrical and Electronics Engineers, Inc, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications (2010), http://standards.ieee.org/getieee802/download/802.11z-2010.pdf. Accessed 8 Mar 2012
Bundesamt für Sicherheit in der Informationstechnik: BSI TR-03128 EAC-PKI’n für den elektronischen Personalausweis, V. 1.1 (2010), https://www.bsi.bund.de/ContentBSI/Publikationen/TechnischeRichtlinien/tr03128/index_htm.html. Accessed 8 Mar 2012
The Institute of Electrical and Electronics Engineers, Inc., EEE standard for local and metropolitan area networks: overview and architecture (2002), http://standards.ieee.org/getieee802/download/802-2001.pdf. Accessed 8 Mar 2012
A. Benlian, T. Hess, P. Buxmann, Software-as-a-Service: Kunden-Anbieterstrategien (Kundenbedürfnisse und Wertschöpfungsstrukturen, Gabler, 2010)
M.-P. Schapranow, M. Lorenz, A. Zeier, H. Plattner, License-based access control in EPCglobal networks, in Proceedings of 7th European Workshop on Smart Objects: Systems, Technologies and Applications, VDE, 2011
M.-P. Schapranow, ENIAC tutorial: the modulo function (2006), http://www.myhpi.de/~schapran/eniac/modulo. Accessed 8 Mar 2012
M.R. Rieback, B. Crispo, A.S. Tanenbaum, The evolution of RFID security. IEEE Pervasive Comput. 5, 62–69 (2006)
B.W. Lampson, Protection, in Proceedings of 5th Princeton Conference on Information Sciences and Systems (1971), pp. 437–443
European Commission, Recommendation on privacy and data protection in applications supported by radio-frequency identification (2009), http://ec.europa.eu/information_society/policy/rfid/documents/recommendationonrfid2009.pdf. Accessed 8 Mar 2012
Federal Office for Information Security, BSI standard 100–3: risk analysis based on IT-Grundschutz V.2.5 (2008)
S.L. Garfinkel, A. Juels, R. Pappu, RFID privacy: an overview of problems and proposed solutions. IEEE Secur. Priv. 3, 34–43 (2005)
S. Spiekermann, Privacy enhancing technologies for RFID in retail: an empirical investigation, in Proceedings of the 9th International Conference on Ubiquitous Computing (Springer, Berlin, 2007), pp. 56–72
E. Bertino, P.A. Bonatti, E. Ferrari, TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4, 191–233 (2001)
M.-P. Schapranow, J. Müller, A. Zeier, H. Plattner, Security aspects in vulnerable RFID-aided supply chains, in Proceedings of 5th European Workshop on RFID Systems and Technologies, VDE, 2009
US Pharmaceuticals Pfizer Inc., Anti-counterfeit drug initiative workshop and vendor display (2006),http://www.fda.gov/OHRMS/DOCKETS/dockets/05n0510/05N-0510-EC21-Attach-1.pdf. Accessed 8 Mar 2012
METRO Group, METRO group and RFID (2008), http://www.future-store.org/fsi-internet/get/documents/FSI/multimedia/pdfs/broschueren/RFID%20und%20MG-E-271108-Internet.pdf. Accessed 8 Mar 2012
FoeBuD e.V. Die StopRFID-Seiten des FoeBuD e.V. (2012), http://www.foebud.org/rfid/index_html. Accessed 8 Mar 2012
M. Abadi, C. Fournet, Access control based on execution history, in Proceedings of the 10th Annual Network and Distributed System Security, Symposium (2003), pp. 107–121
G. Edjlali, A. Acharya, V. Chaudhary, History-based access control for mobile code, in Proceedings of 5th Conference on Computer and Communications, Security (1998), pp. 38–48
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schapranow, MP. (2014). Related Work. In: Real-time Security Extensions for EPCglobal Networks. In-Memory Data Management Research. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36343-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-36343-6_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36342-9
Online ISBN: 978-3-642-36343-6
eBook Packages: Business and EconomicsBusiness and Management (R0)